Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Centos » Moderate CentOS 7 tomcat Security Update

Moderate CentOS 7 tomcat Security Update

  • Vendor: Centos
  • Vendor ID: CESA-2015:0983
  • Date: May 13, 2015


CentOS Errata and Security Advisory 2015:0983 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0983.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

x86_64:
2169da879210fb2d5bda1c33d3fb7ad2b36d6496e2e714bbf776b33976257b70 tomcat-7.0.54-2.el7_1.noarch.rpm
ef7e8a0f9328dc18ea0cd92eb70cc50e8e1ff41057df9499488e326d6a7527de tomcat-admin-webapps-7.0.54-2.el7_1.noarch.rpm
2a72055b7d45015081af6d719d8bede7e7e56c0f7f576064ecb45fee43bb7036 tomcat-docs-webapp-7.0.54-2.el7_1.noarch.rpm
8a01e12d2318a4d705c41e811529c6a88f8c2275ff710094a33271ce868ac53a tomcat-el-2.2-api-7.0.54-2.el7_1.noarch.rpm
809c905682556a1d3d2af13dc1553240583899a3154ff24cd3e3b51f4f30b7f6 tomcat-javadoc-7.0.54-2.el7_1.noarch.rpm
c82ed9c183048710ca98e7cd4bd21480b3e4ccc57a022e4adf3bc0dfdfb6c69b tomcat-jsp-2.2-api-7.0.54-2.el7_1.noarch.rpm
3885b86adde8ce663e940a72b4672fc4dc2a3325024b19a330098e5eb058d3c4 tomcat-jsvc-7.0.54-2.el7_1.noarch.rpm
7939d7c3583f473a1fdf385272b56c7f01c07fbbb529ff9a7233fdb8c31ef99c tomcat-lib-7.0.54-2.el7_1.noarch.rpm
7656a262ec9710026359fe09017700d0820e81e11a1dad8270625868367948f4 tomcat-servlet-3.0-api-7.0.54-2.el7_1.noarch.rpm
b03bb8d10559cf4a5466debf3b1627fa6597b9ae6ab8432ff09c3e014dfb444d tomcat-webapps-7.0.54-2.el7_1.noarch.rpm

Source:
874cbf882c5e1d877db93a7e9384de22d6296f858f12fdf18119693dfbc1c8b3 tomcat-7.0.54-2.el7_1.src.rpm



--
Johnny Hughes
CentOS Project { http://www.centos.org/ }
irc: hughesjr, #centos at irc.freenode.net

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »